A visit to the dark side (sponsor presentation)

Wednesday 4 October 17:00 - 17:30, Red room

Tony Anscombe (ESET)

ESET's Global Security Evangelist will explore just how difficult it is to acquire a customized malware strain that could be used to target businesses or consumers to gain money or personal data. Are there really companies that will support and obfuscate malware on demand, and what does it cost? And what if you only want to purchase the data from a breach? Join us on this journey to the dark side - we promise to bring you back!



Tony Anscombe

Tony Anscombe is the Global Security Evangelist for ESET, an industry-leading IT security software and services company for businesses and consumers worldwide. With over 20 years of security industry experience, Anscombe is an established author, blogger and speaker on the current threat landscape, security technologies and products, data protection, privacy and trust, and Internet safety. His speaking portfolio includes industry conferences RSA, CTIA, MEF, GlobSEC and Child Internet Safety (CIS). He has been quoted in security, technology and business media, including BBC, The Guardian, The Times and USA Today, with broadcast appearances on Bloomberg, BBC, CTV, KRON and CBS. Anscombe has served on the board of MEF and FOSI and holds an executive position with the Anti-Malware Testing Standards Organization (AMTSO).






Other VB2017 papers

Mariachis and jackpotting: ATM malware from Latin America

Thiago Marques (Kaspersky Lab)

Fabio Assolini (Kaspersky Lab)

Of all the forms of attack against financial institutions in the world, the ones that are most likely to combine traditional…

Keynote address: Inside Cloudbleed

John Graham-Cumming (Cloudflare)

In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…

Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Juan Andres Guerrero-Saade (Kaspersky Lab)
Costin Raiu (Kaspersky Lab)

Attribution is complicated under the best of circumstances. Sparse attributory indicators and the possibility of overt…

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.